Search results for:
-
Feb 21st, 2019
Fusing Intelligence Operations with Security Orchestration
Featured Speakers: – Andy Pendergast Vice President of Product – ThreatConnect – Jon Oltsik Senior Principal Analyst – Enterprise Strategy Group The cybersecurity landscape mov
-
Feb 21st, 2019
ThreatConnect STIX TAXII
Learn more about ThreatConnect’s STIX-TAXII capabilities in this short video.
-
Feb 21st, 2019
Demystifying Intelligence Analysis
Watch this video to learn how to research threats and build better processes in your organization.
-
Feb 21st, 2019
Mitigate Threats Faster with an Intelligence-Driven Defense
Learn how to understand adversaries and mitigate threats to your network faster using threat intelligence. For more information, visit threatconnect.com/solutions.
-
Feb 21st, 2019
Threat Intelligence Platforms: Open Source vs. Commercial
In this white paper, we discuss the key technical and economic considerations every security team needs when contemplating an open source or commercial threat intelligent platform.
-
Feb 21st, 2019
ThreatConnect Playbook Actions
Learn how to unite your threat intelligence and orchestration using ThreatConnect. tc-pm@threatconnect.com
-
Feb 21st, 2019
Turn Historical Threat Data into Actionable Intelligence Using Analytics
Learn how threat data becomes intelligence, how to structure historical threat data for tactical planning, and more.
-
Feb 21st, 2019
SIEM + Threat Intelligence
Learn how to quickly identify the threats that are important to you. Download our SIEM + Threat Intelligence white paper paper here: /resource/siem-threat-intelligence-quickly-identify-the-threats-tha
-
Feb 21st, 2019
A ThreatConnect Success Story: Upgrading from an Open Source TI Database
Find out how ThreatConnect helped a customer meet these objectives: Transfer all existing data from the open source database to ThreatConnect. Maintain all original creation dates, since the customer
-
Feb 21st, 2019
Webinar: “How to Prioritize and Protect Against Relevant Threats: Context is Key”
Joint webinar featuring ThreatConnect and FireEye iSight Intelligence: How to Prioritize and Protect Against Relevant Threats: Context is Key.
-
Feb 21st, 2019
[Webinar] Guccifer 2.0, the DNC Hack, and Fancy Bears, Oh My!
Follow Toni Gidwani, Director of Research Operations at ThreatConnect, in this webinar recording as she shares the intelligence used by the ThreatConnect Research team to search for answers surroundin
-
Feb 20th, 2019
A Fresh Look at Security Analytics
Did you know data can be viewed in three categories: “regular data, big data, and “too-big-for-you” data? In this white paper, ThreatConnect’s Director of Analytics discusses how security anal